In the years recently city planning projects have been confirmed sustainable high concentration on planning streets and pedestrian paths being the most prominent component of the urban structure in the city and these me and diverse departments link the city’s sectors and serve as a space for economic, service, and social activities. On the other hand, pedestrian traffic is an essential component of the various means of transportation within the city. Suffer cities in the Middle East and Arab cities in particular are neglecting pedestrian paths in the vital urban environment. Vehicle control mechanisms on roads, and changing the uses of pedestrian paths as result of encroaching on the sidewalks designated for pedestrians. Which leads to a weak level of safety and a lack of pedestrian protection, so it is assumed that there is a possibility to know the impact of the urban elements of pedestrian paths that provide protection And a sense of safety for pedestrians through advanced simulation programs (Any Logic 8.8.0 university researcher 2022, GIS 10.4) and the possibility of achieving safe. And comfortable paths for pedestrians by providing the elements affecting the provision of a safe environment. And the protection of pedestrians, we aim through sustainable planning to enhance the role of pedestrian paths, the separation between automatic mobility paths, And pedestrian paths, knowing the extent of the impact of the elements of pedestrian paths in achieving safety and protection for users (it must be noted that the feeling of safety is not limited to traffic accidents only, but also protection from weather conditions and its effects). As the descriptive analytical approach is adopted. In the research to identify the road elements in providing a safe environment for pedestrians and then study the relationship between those elements by analyzing the multiple regression of the parameter variables and their relationship to the independent variable (feeling of safety) for a sample questionnaire
The financial crises that occurred in South East Asia and America, and the discovery of the financial and administrative corruption that affected these companies, which led to the crisis. Since then, organizations and institutions interested in accounting have begun new ways to further rationalize the management of these companies. Hence the concept of governance, which means good governance. Al-Susiya confirmed its adoption of the financial reporting standards and adopted internal and external auditing for the purpose of increasing the reliability and credibility of the financial and reports that increase the confidence of investors in making their investment decisions in the financial markets The study dealt with the contributi
... Show MoreEstimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order
... Show MoreThe Dagum Regression Model, introduced to address limitations in traditional econometric models, provides enhanced flexibility for analyzing data characterized by heavy tails and asymmetry, which is common in income and wealth distributions. This paper develops and applies the Dagum model, demonstrating its advantages over other distributions such as the Log-Normal and Gamma distributions. The model's parameters are estimated using Maximum Likelihood Estimation (MLE) and the Method of Moments (MoM). A simulation study evaluates both methods' performance across various sample sizes, showing that MoM tends to offer more robust and precise estimates, particularly in small samples. These findings provide valuable insights into the ana
... Show MoreIn this work the diode planer magnetron sputtering device was
designed and fabricated. This device consists of two aluminum discs
(8cm) diameter and (5mm) thick. The distance between the two
electrodes is 2cm, 3cm, 4cm and 5cm.
Design and construction a double probe of tungsten wire with
(0.1mm) diameter and (1.2mm) length has been done to investigate
electron temperature, electron and ion density under different
distances between cathode and anode. The probes were situated in
the center of plasma between anode and cathode.
The results of this work show that, when the distance between
cathode and anode increased, the electron temperature decreased.
Also, the electron density increases with the increasing
The study of the characteristics of the heritage fabric is one of the important things in studies of conservation and rehabilitative use. There are three main elements of rehabilitation and they are considered the basis for achieving the rehabilitation process and these elements are (development, sustainability, participation) and that the first item addressed in the research is heritage and urban fabric in heritage areas where characteristics have been studied And a problem, while the second term is rehabilitation, where the concept of rehabilitation, the types and causes of the process of rehabilitation and the benefits and qualifications that affect the urban fabric that are represented (social, economic, religious and political) were
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the